共 21 条
- [1] Bay A, 2010, LECT NOTES COMPUT SC, V6467, P1, DOI 10.1007/978-3-642-17619-7_1
- [2] Automatic Demirci-Selcuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 233 - 247
- [3] Danping Shi, 2018, Advances in Cryptology - ASIACRYPT 2018. 24th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings: Lecture Notes in Computer Science (LNCS 11273), P3, DOI 10.1007/978-3-030-03329-3_1
- [5] Derbez P, 2013, LECT NOTES COMPUT SC, V7881, P371, DOI 10.1007/978-3-642-38348-9_23
- [6] EXHAUSTIVE CRYPT-ANALYSIS OF NBS DATA ENCRYPTION STANDARD [J]. COMPUTER, 1977, 10 (06) : 74 - 84
- [7] [杜承航 Du Chenghang], 2012, [山东大学学报. 理学版, Journal of Shangdong University], V47, P55
- [8] DU Chenghang, 2012, J SHANDONG U NATURAL, V47, P69
- [9] Dunkelman O, 2010, LECT NOTES COMPUT SC, V6477, P158, DOI 10.1007/978-3-642-17373-8_10
- [10] [付立仕 Fu Lishi], 2016, [电子与信息学报, Journal of Electronics & Information Technology], V38, P848